Cyber Security Issues in Smart Grids

1 Graduate Student, Dept. of Electrical Engineering, Rochester Institute of Technology, Dubai, UAE
2Professor, Dept. of Electrical Engineering, Rochester Institute of Technology, Dubai, UAE

***
Abstract - Cybersecurity for the smart grid is essential to ensure the resiliency of the supply and delivery of electrical power. Cybersecurity for the utility’s electrical grid monitoring and control systems provides the actions required to preclude the unauthorized use of, denial of service to, modification to, disclosure of, loss of revenue from, or destruction of, critical system or informational assets. Cyber attacks andviruses have caused power disruptions, and malware has caused factories to manufacture bad products and even destroy product components.
In this paper we will review the fundamental cybersecurity issues in modern smart grid environment. This includes the different types of security threats, Common Vulnerabilities, and Security Standards, Regulations, and Guidance.
Key Words: Cybersecurity, Electrical Power, Smart Grid, Cyber attacks, Security Standards.
1. INTRODUCTION
With strong arrangements that develop the proficiency of standard Electric Grids, Smart Grid innovation is going to change the current industry. The Smart Grid is a computerized interchanges based energy dispersion organization. The rising burden and utilization requests entangle power issues. For instance, the interest has expanded,andissueslikepoweroutages,over burdens,and voltagehangshaveemerged,aswellastheflowofelectrical organization discharging basic fossil fuel byproducts and, aboveall,managingdigitalassaults[1].TheUnitedStatesis liableforupto40%ofall carbondioxidedischargesfrom power frameworks, which is unsafe for the climate. The Smart Grid is supposed to further develop proficiency, dependability, and accessibility by coordinating modern advances,forexample,availabilityandexpandedhandling power[2].TheSmartGridlikewisegivesaframeworkthatis connectedtotwo waycorrespondenceandpowerstreams. The Smart Grid is an efficient innovation that acquires heritagepoweragemethodslikegaseouspetrol,petroleum products, and coal, as well as environmentally friendly powersourceslikebreezeturbinesandsun basedpower[3]. TheSmartGridisperceivedfordisseminatingandinvolving powerinanefficientwaytoanorganizationofsmartgrid gadgets,transformers,andgear.Agreeable,sinceitutilizes two waycorrespondencetoaccomplishthesepoints,though the heritage matrix framework just purposes one way correspondence[4]
Fig 1:DomainsofSmallGrid
TheSmartGridfurnishesclientswithexpedientandbetter administrations with a decreased response time delay, permitting the energy issue to be actually tended to [5] Notwithstanding, Smart Grid innovation isn't without imperfectionsanddifficulties,themostgenuineofwhichis the powerlessness to get the most significant resource: information. The purposes behind this are that the Smart Grid framework will regularly trade data since delicate information might be put away there [6]. Since different gadgets, both business and private, will be associated througha progressionoforganizationstoimpartandgive security to the organizations utilizing different methodologies, network protection in the Smart Grid is a pivotalaction[7].Thesearetroublesomehardshipsthatwill be tended to through a writing survey in which an assortment of safety arrangements will be evaluated and brokendowntogiveanswersforcomplexsecurityissues[8].
2. ISSUES RELATED TO OPERATIONOF SMALL GRID
Theactualpowerframeworkandthedigitalarrangementof data and correspondence advancements are inseparably connectedinasmartgrid,presentinghugesecurityissues. Smart grid security issues should be addressed for the framework to be dependable, protected, proficient, and stable [9]. To keep up with the security of the inexorably tremendousandcomplexpowerfulbrilliantlatticeclimate, present safety efforts are either unimportant, not
Volume: 09 Issue:
www.irjet.net

reasonable, deficiently versatile, incongruent, or basically lacking, and should be supplanted by new and modern arrangements [10]. A smart grid is comprised of actual power framework parts as well as a digital framework foundation, which incorporates programming, equipment, and correspondence needs. Power will move from mass creating plants to end clients in a run of the mill brilliant networkdesign.Datastream,thenagain,willhappenintwo ways, i.e., at the gadget level for coordination and among administrators and specialist co ops for productive and upgradedcontrol[11]
Therefore, both digital and actual framework security are basic in a brilliant network, and considering security challenges in the digital domain and the actual power framework independently can't catch the whole picture. Comingupnextarea portionofthedigital actual brilliant matrix'ssecurityconcerns[12]:
Thebrilliantmatrix'sactualparts
Controlapplicationsandcontrolfocus
The digital frameworks for brilliant network activityandarrangingarestrong,dependable,and proficient[9].
The connection between digital assaults and the ramificationsforactualframeworks
Theshieldsaresetuptolessentheperilspresented bydigitaldangers[13]
and Technology (IRJET)
e ISSN: 2395 0056
p ISSN: 2395 0072
example,touchydataaboutclients,whichmightbeindanger ofbeingtakenorthefirmbeingcloseddownforever.These risks are not restricted to web clients; they additionally influenceclientsathome,whereassailantsmightendeavor toassembleindividualdata[15]
Fig 2:SmallGridArchitecture
3. CYBER SECURITY ISSUES IN SMART GRID


TheseareafewlikelynormaldangerstoSmartGridsthat could be compelling. There are various perils that Smart Grids might confront, and these dangers might hurt companies as well as standard clients [14]. These perils mightaddresssignificantthreatstoindividualsecurity,for
3.1 Phishing
Sincephishingissoeasytodirect,itverywell maybethe initial phase in putting clients and organizations at risk. Programmerscouldtakeadvantageofdatafrompurchasers, for example, bills or installment receipts that were not as expecteddisposedof,andutilizethisdata,alongwithsocial designing,togetfundamental dataaboutthefirm,forthis situation,dataaboutthepowerprovider[16]
Thenagain,therepresentativemightconfrontdifferentrisks inside the firm, for example, fake messages or correspondencesthatseem,byallaccounts,tobecertifiable messages,inwhichtheworkermightenterindividualdata that could prompt a hack [17]. These perils are probably goingtohurtaSmartGridclient,asgivingdatatoobscure sources and without knowing the consequences of these dangerscouldmonetarilyaffectclients.Notwithstanding,is it an important concern while managing safety efforts againstphishingassaults?
3.2 Denial of Service
TheDenial of Service(DoS)attackisanessentialone,and anyassaultagainstaccessibilityisaDoSassault.Onaccount oftheSmartGrid,themainadministrationsforSmartGrids are accessible, suggesting that the Smart Grid might be exposed to a Denial of Service attack. The availability associationforthe Smart Gridshould be secure andsolid. Since the Smart Grid utilizes appropriated compositional frameworks to spread associations with endless gadgets over a more extensive area, the association should be trustworthy and secure [18]. On the off chance that a dispersedforswearingof administration(DDoS)assaultis
Fig 3:SmallGridSecuritysourcesofthreatsEngineering and Technology (IRJET)

Volume: 09 Issue: 04 | Apr 2022 www.irjet.net
sentoffagainsttheSmartGrid,itwillbeseriouslyhurt[19] Refusal of Service assaults jam the channel and are a successivewaytodealwithfocusontheOSI actualModels andinformationconnectlayers.Programmersmightactually change the MAC address and utilize a programmer's instrumentlike"TidalwaveBackdoor"tosecuresecondary passageadmittancetotheorganization,permittingthemto overpowerPCswithcustomaryorganizationdemands[20] Moreover, while the OSI Model incorporates different securityconventionsattheNetworkandTransportlayers, like TCP, SSL, and IPv6, the conventions are as yet weak whenutilizedinSmartGridnetworkdesign.Inanycase,the (DoS)assaultwillgenerallybedoneattheApplicationlayer of the OSI Model since the Application layer takes into consideration information transmission and gathering, however, in the Smart Grid, a (DoS) attack can keep the correspondence framework from answering different gadgets[21]
3.3 Malware Spreading
TheprincipaldangertotheSmartGridisthemultiplication ofmalware,whichisamajorissue.Theaggressorscanmake malware that can be utilized to contaminate both the association'sframeworksanditsgadgets[22].Theaggressor can impact the working of gadgets or frameworks by circulatingmalware,permittingtheassailantstogetaccess toandsecuredelicatedata.
3.4 Eavesdropping and Traffic Analysis
Spoofing Parodying assaults incorporate listening in and traffic examination. By observing organization traffic, the assailantcangetdelicatedata[23].TheSmartGridwillbe helpless against this danger because of its gigantic organization; the Smart Grid has many organization hubs, makingithardtokeepupwiththegadgetsassociatedwith the greater organization. The Smart Grid gives the most seriousriskofinformationrobbery,whichisacriticalissue ininformationsecurityallovertheplanet[24]
4. CASE STUDY
Smartgridshavelongbeenacrucialcomponentofenergy networks, incorporating a variety of instruments such as computers science technology and linked gadgets. It has aidedintheoptimizationofenergyproduction,distribution, consumption,andstorage[25].Theadventofcomputersand complicated technologies to modernize electric grids has resultedinsecuritybreaches,resultingincyber attacksthat exploitcomputerweaknessestoenternetworks[26].Wind turbines, concentrated solar power plants, photovoltaic panels, and possibly even plug in hybrid vehicles are examplesofenergyrenewableresourceswherethisoccurs. Forexample:ThePowerSubstationCyberAttackThatShook theWorld.InDecember2015,apowerfulframeworkinthe area of Ukraine went down for six hours. As indicated by
e ISSN: 2395 0056
p ISSN: 2395 0072
Wired’s full report on Ukraine's power network hack, the blackoutwasexpectedtobeacyberattackthatcausedthe gadgetsthatcoursepowerandchangevoltagestoseparate from the fundamental framework. Despite the fact that Ukraine's power framework network was appropriately portionedfromthecontrolplacenetworksutilizingfirewalls, thetelecommuterswereallthewhilesigningintotheSCADA networkwithoutlegitimateconfirmationstrategies[27].The aggressors figured out how to invade the organization utilizing Malware, assembled insight, and eventually capturedtheVPNcertificationstogettotheSCADAnetwork that controlled the power matrix. The programmers who struckthepowerhabitatsinUkrainetheprincipalaffirmed hacktobringdownapowerlattice weren'tentrepreneurs whosimplychancedupontheorganizationsandsentoffan assaulttotesttheircapacities;asindicatedbynewsubtleties froma broadexaminationconcerningthe hack,theywere talented and secretive specialists who painstakingly arranged their attack over numerous months, first doing observationtoconcentrateontheorganizationsandsiphon administratorcertifications,thensendingoffasynchronized attackinaverymucharrangeddance[28]
LeeisapreviousdigitalfightingtasksofficialfortheUSAir ForceandisafellowbenefactorofDragosSecurity,abasic foundationsecurityorganization."Asfarasrefinement,the vast majority generally malware," he says. "To me what makesrefinementiscoordinatedfactorsandarrangingand tasksandwhat'shappeningduringitslength.Furthermore, this was profoundly modern." Ukraine rushed to blame Russia for the attack [29]. Lee avoids ascribing it to any entertaineryetsaystherearecleardepictionsbetweenthe differentperiodsoftheactivitythatproposevariousdegrees ofentertainersdealtwithvariouspiecesoftheattack.This raises the likelihood that the assault could host included cooperation between totally various gatherings perhaps cybercriminalsandcountrystateentertainers.
Fig 4:PercentageofCyberSecurityattacksonSmart Grids

ISSN:
ISSN:

5. SOLUTIONS
5.1 Encryption
Encryptionisthetechniqueforencodinginformationsothat itcan'tbeperused.AtthepointwhenyouutilizeaVPNto associatewiththeweb,yourassociationisencoded,which demonstrates that assailants would possibly get strange code assuming they caught your information stream [30]. Encryptioncanbeconsideredakindofmysterycode.Acode isastrategythroughwhichyourinformationismixed,and thereisacodethatletsyoudecipherthemessage.Themost recommended VPN organizations use AES 256 digit encryption, which is the most elevated encryption grade available[31]
5.2 Malware Protection
Malware insurance is expected for the Smart Grid on the grounds that the installed frameworks and broadly useful frameworksthatareassociatedwithitshouldbegottenand watchedfromdigitalassaults.Theprimaryexplanationthat firmware is secure is that it is simply presented to run programmingthatisobtainedbythecreatorandrequiresa creationkeytoprovetheproduct,whileuniversallyuseful specific from outsider applications, for example, antivirus programming,whichiscontinuallyupdated[32].
5.3 Authentication
Accordingtothecreators,keepingupwitha confirmation andcontrollingaccessarethemainpressingissues,andthe character ought to be approved utilizing solid validation instruments. A "stowed away deny strategy" might be utilized while connecting with the framework, as well as utilizingthearrangementtopermitclientadmittancetojust explicitclients,incarryingoutvalidation[33].Thestrategy givessafetyeffortstotheassociation,andtheinferreddeny strategy can be invaluable in light of the fact that typical clients will have changing authorizations, permitting the Managertoseeeveryoneofextrainformationconnectedto projects while the staff has obliged admittance to information[34].
5.4 Malware Protection
Malware insurance is expected for the Smart Grid on the groundsthattheinsertedframeworksanduniversallyuseful frameworksthatareassociatedwithitshouldbegottenand monitoredfromdigitalassaults [35].Theprincipalreason thatfirmwareissecureisthatitissimplypresentedtorun programmingthatisacquiredbythecreatorandrequiresa creationkeytovalidatetheproduct,thoughbroadlyuseful specific form outsider application, for example, antivirus programming,whichiscontinuallyrefreshed[36]
5.5 Network Security
When using a wireless internet, such as the Internet, a Virtual Private Network addsan extra layer of protection. Becausedatamaybeatthreatwhenusingpublicnetwork infrastructure,theemploysarangeofsecuritymechanisms, including encryption and the protection of any data transmitted all across network. VPNs are also utilized for communicationbecausetheyprovideasecurechannel[37]

5.6 Remote Access VPN
TheremotemonitoringVPN connectstoanorganization's privatenetworkviaapublicnetwork,suchastheinternet. Afterestablishingauthentication,customerswillusesmart phones or desktop computers to connect to the VPN gateway. If the credentials are correct, the security can validateaccessandgetaccesstoinformationstoredonthe vpn connection [38]. These resources, which include business software and papers, are exclusively availableto usersoftheorganization.
6. CONCLUSION
Smart Grids are more equipped and useful than standard methodspowermatricesasfarasabilityandcreationsince theyareharmlesstotheecosystem,usealotofsustainable power sources, and are safer. Also, the review recognized expectedbenefitsaswellasweaknessesrelatedtotheSmart Grid. As far as the general advantages of utilizing a Smart Grid, it will give a more extensive range of safety, with variouswaysandmethodstotackleaportionofthedigital assaulttroubles.Bethatasitmay,whileperformingstudies, variouspapershaveproposedthesecurityadvantagesand weaknessesassociatedwithSmartGrids.Prettymuchevery
Fig -5:NetworkSecurityincyber attackubstationof Engineering and Technology (IRJET)

Volume: 09 Issue: 04 | Apr 2022 www.irjet.net
explorationpaperhassuggestedthattheDenial of Service assaultisthemosthazardoussoftspotforSmartGrids.Since SmartGridsarebasedontopoforganizations,attackingthe organizationwouldstoptheSmartGrid.AlthoughtheSmart Gridwillsavethehelp'saccessibilitywithvariousdegreesof safety,embracingaVirtualPrivateNetwork(VPN)formore scrambledtransmissionwouldbethemostidealdecisionfor security. Different gadgets are connected over wide geological region networks represent an issue for Smart Grids. The most troublesome test is getting little gadgets withregardtothemoreextensivefoundation.Byofferinga conveyed and encoded record that is unchangeable to changes made by terrible hubs or assailants, blockchain innovationcouldhelpwiththegoalofsafetychallenges.
REFERENCES
[1] C. C. Sun, A. Hahn, and C. C. Liu, "Cyber security of a power grid: State of the art," International Journal of ElectricalPower&EnergySystems,vol.99,pp.45 56, 2018.
[2] G.Austin,"Corporatecybersecurity,"inCybersecurityin China,ed:Springer,2018,pp.65 79.
[3] A. Milovanov, "Intelligent Solar Energy Devices Cybersecurity System," Physical Optics Corporation 2019.
[4] Y.Yang,T.Littler,S.Sezer,K.McLaughlin,andH.Wang, "Impactofcyber securityissuesonsmartgrid,"in2011 2ndIEEEPESInternationalConferenceandExhibition onInnovativeSmartGridTechnologies,2011,pp.1 7.
[5] J. Yao, "Cybersecurity of demand side management in the smart electricity grid," Ph. D. dissertation, Dept. Elect.Eng.,LehighUniv.,Bethlehem,PA,USA,2017.
[6] M.B.Line,I.A.Tøndel,andM.G.Jaatun,"Cybersecurity challenges in Smart Grids," in 2011 2nd IEEE PES international conferenceandexhibition oninnovative smartgridtechnologies,2011,pp.1 8.
[7] P.P.Biswas,H.C.Tan,Q.Zhu,Y.Li,D.Mashima,andB. Chen,"Asynthesizeddatasetforcybersecuritystudyof IEC61850basedsubstation,"in2019IEEEInternational ConferenceonCommunications,Control,andComputing TechnologiesforSmartGrids(SmartGridComm),2019, pp.1 7.
[8] Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on cyber security for smart grid communications," IEEE CommunicationsSurveys&Tutorials,vol.14,pp.998 1010,2012.
[9] E. L. Webb, "The Internet of Things: Cybersecurity, Insurance,andtheNationalPowerGrid,"Nat.Resources &Env't,vol.30,p.35,2015.
e ISSN: 2395 0056
p ISSN: 2395 0072
[10] A. Qureshi, "Cybersecurity in physically entangled networks."
[11] M.Z.GunduzandR.Das,"Cyber securityonsmartgrid: Threats and potential solutions," Computer networks, vol.169,p.107094,2020.
[12] B.E.Camachi,L.Ichim,andD.Popescu,"Cybersecurity of smart grid infrastructure," in 2018 IEEE 12th International Symposium on Applied Computational IntelligenceandInformatics(SACI),2018,pp.000303 000308.
[13] J. Johnson, J. R. Hoaglund, R. D. Trevizan, and T. A. Nguyen,"PHYSICALSECURITYANDCYBERSECURITY OFENERGYSTORAGESYSTEMS."
[14] N. U. Ibne Hossain, M. Nagahi, R. Jaradat, C. Shah, R. Buchanan, and M. Hamilton, "Modeling and assessing cyberresilienceofsmartgridusingBayesiannetwork basedapproach:asystemofsystemsproblem,"Journal of Computational Design and Engineering, vol. 7, pp. 352 366,2020.
[15] J. Liu, Y. Xiao, S. Li, W. Liang, and C. P. Chen, "Cyber security and privacy issues in smart grids," IEEE CommunicationsSurveys&Tutorials,vol.14,pp.981 997,2012.
[16] I. Fette, N. Sadeh, and A. Tomasic, "Learning to detect phishing emails," in Proceedings of the 16th internationalconferenceonWorldWideWeb,2007,pp. 649 656.
[17] N.Saxena,S.Grijalva,V.Chukwuka,andA.V.Vasilakos, "Network security and privacy challenges in smart vehicle to grid,"IEEEWirelessCommunications,vol.24, pp.88 98,2017.
[18] J. Johnson, I. Onunkwo, P. Cordeiro, B. J. Wright, N. Jacobs, and C. Lai, "Assessing DER network cybersecuritydefencesinapower communicationco simulationenvironment,"IETCyber PhysicalSystems: Theory&Applications,vol.5,pp.274 282,2020.
[19] J.Hull,H.Khurana,T.Markham,andK.Staggs,"Staying incontrol:Cybersecurityandthemodernelectricgrid," IEEE Power and Energy Magazine, vol. 10, pp. 41 48, 2011.
[20] D.Moore,C.Shannon,D.J.Brown,G.M.Voelker,andS. Savage, "Inferring internet denial of service activity," ACMTransactionsonComputerSystems(TOCS),vol.24, pp.115 139,2006.
[21] H.Khurana,M.Hadley,N.Lu,andD.A.Frincke,"Smart gridsecurityissues,"IEEESecurity&Privacy,vol.8,pp. 81 85,2010.
Research Journal of Engineering and Technology (IRJET)

Volume: 09 Issue: 04 | Apr 2022 www.irjet.net
[22] T.S.Gopal,M.Meerolla,G.Jyostna,P.R.L.Eswari,andE. Magesh, "Mitigating Mirai malware spreading in IoT environment," in 2018 International Conference on Advances in Computing, Communications and Informatics(ICACCI),2018,pp.2226 2230.
[23] J.Sakhnini,H.Karimipour,A.Dehghantanha,R.M.Parizi, andG.Srivastava,"SecurityaspectsofInternetofThings aided smart grids: A bibliometric survey," Internet of things,vol.14,p.100111,2021.
[24] W. Wang and Z. Lu, "Cyber security in the smart grid: Surveyandchallenges,"Computernetworks,vol.57,pp. 1344 1371,2013.
[25] L. James, "Making cyber security a strategic business priority,"NetworkSecurity,vol.2018,pp.6 8,2018.
[26] A. Sajadi, L. Strezoski, V. Strezoski, M. Prica, and K. A. Loparo,"Integrationofrenewableenergysystemsand challenges for dynamics, control, and automation of electrical power systems," Wiley Interdisciplinary Reviews:EnergyandEnvironment,vol.8,p.e321,2019.
[27] J. Hong, C. C. Liu, and M. Govindarasu, "Integrated anomalydetectionforcybersecurityofthesubstations," IEEETransactionsonSmartGrid,vol.5,pp.1643 1653, 2014.
[28] J. E. Sullivan and D. Kamensky, "How cyber attacks in UkraineshowthevulnerabilityoftheUSpowergrid," TheElectricityJournal,vol.30,pp.30 35,2017.
[29] D. E. Whitehead, K. Owens, D. Gammel, and J. Smith, "Ukraine cyber induced power outage: Analysis and practical mitigation strategies," in 2017 70th Annual ConferenceforProtectiveRelayEngineers(CPRE),2017, pp.1 8.
[30] J. B. Ulven and G. Wangen, "A systematic review of cybersecurity risks in higher education," Future Internet,vol.13,p.39,2021.
[31] W. F. Boyer and S. A. McBride, "Study of security attributesofsmartgridsystems currentcybersecurity issues,"IdahoNationalLaboratory(INL)2009.
[32] Z.ElMrabet,N.Kaabouch,H.ElGhazi,andH.ElGhazi, "Cyber securityinsmartgrid:Surveyandchallenges," Computers & Electrical Engineering, vol. 67, pp. 469 482,2018.
[33] C. W. Crews, "Cybersecurity and Authentication: the marketplace role in rethinking anonymity before regulatorsintervene,"Knowledge,Technology&Policy, vol.20,pp.97 105,2007.
[34] J.Qi,A.Hahn,X.Lu,J.Wang,andC. C.Liu,"Cybersecurity fordistributedenergyresourcesandsmartinverters,"
e ISSN: 2395 0056
p ISSN: 2395 0072
IETCyber PhysicalSystems:Theory&Applications,vol. 1,pp.28 39,2016.
[35] S. Ndichu, S. McOyowo, H. Okoyo, and C. Wekesa, "A Remote Access Security Model based on Vulnerability Management," International Journal of Information Technology and Computer Science, vol. 12, pp. 38 51, 2020.
[36] P.D.Ray,R.Harnoor,andM.Hentea,"Smartpowergrid security:Aunifiedriskmanagementapproach,"in44th Annual2010IEEEinternationalCarnahanconferenceon securitytechnology,2010,pp.276 285.
[37] L.T.Heberlein,G.V.Dias,K.N.Levitt,B.Mukherjee,J. Wood, and D. Wolber, "A network security monitor," LawrenceLivermoreNationalLab.,CA(USA);California Univ.,Davis,CA(USA…1989.
[38] J. Steinberg and T. Speed, SSL VPN: Understanding, evaluating, and planning secure, web based remote access:PacktPublishingLtd,2005.
BIOGRAPHIES
TurkeiAldarraiisagraduateofElectrical Engineering from the Higher Colleges of Techology,Dubai,UAE Currentlypursuing his Master’s degree in Electrical Engineering,specializinginSmartGridsat Rochester Institute of Technology (RIT), DubaiCampus.

Dr. Abdalla Ismail is a professor of Electrical Engineering at Rochester Institute of Technology, Dubai, UAE. He receivedhisPh.D.inElectricalEngineering from the University of Arizona, USA. He hasover35yearsofexperienceinhigher education, teaching, research and management. HewastheAssociateDean of Faculty of Engineering and member of the President Technical Office at UAE University. His education and research interestsareinintelligentcontrolsystems, smart energy and grids, and renewable energy. He published over one hundred and ten technical papers and two co authored books. He has participated in severalhighereducationqualityassurance and accreditation programs boards and committees in the UAE and other GCC countries Hereceivedseveralprizesand awards including the Emirates Energy Award, IEEE Millennium award, and Fulbrightscholarship.
